Power Systems Monitoring and Control using Telecom Network Management Standards



Similar documents
Telecommunications Systems 2

Tik-109/ Telecommunications architectures:

Telecommunications Management Network (TMN)

Lecture 18: Telecommunications Management Network (TMN)

Operations System. Data Communication Network. Exchange. Telecommunication network

Chapter 18. Network Management Basics

NETWORK AND SERVICES MANAGEMENT AND CONTROL MSc MODULE (EEM.nsm)

IEC 61850: Communication Networks and Systems in Substations

INTERNATIONAL TELECOMMUNICATION UNION

Network Management (NETW-1001)

Integrated management information in utilities

Management Functional Areas

A MODERN DISTRIBUTION MANAGEMENT SYSTEM FOR REGIONAL ELECTRICITY COMPANIES

Simple Network Management Protocol

Communications Management. 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey)

How To Manage A Distributed Application

White Paper. Requirements of Network Virtualization

Lecture 5: Foundation of Network Management

A process-driven methodological approach for the design of telecommunications management systems

Simple Network Management Protocol

Use Case 29: Data Acquisition from External DMS Network Monitoring Subsystem

ETSI TR V1.1.2 ( )

Internet-Accessible Power Monitoring & Control Systems

10 Gigabit Ethernet: Scaling across LAN, MAN, WAN

Securing Distribution Automation

ITU-T Kaleidoscope Conference Innovations in NGN. Managing NGN using the SOA Philosophy. Y. Fun Hu University of Bradford

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.

Simple Network Management Protocol

Comprehensive Asset Performance Management. Power Transmission and Distribution

3GPP TS V8.0.0 ( )

Secure Access Link. Table of Contents. Introduction. Background. avaya.com. Introduction Background Secure Access Link...

TELECOMMUNICATION SERVICE MANAGEMENT

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

IEC SCL - MORE THAN INTEROPERABLE DATA EXCHANGE BETWEEN ENGINEERING TOOLS

CHAPTER THREE, Network Services Management Framework

Managing a Fibre Channel Storage Area Network

ABSTRACT INTRODUCTION MATERIALS AND METHODS

FOXBORO. I/A Series SOFTWARE Product Specifications. I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 OVERVIEW

SERIES M: TELECOMMUNICATION MANAGEMENT, INCLUDING TMN AND NETWORK MAINTENANCE Integrated services digital networks

Integration Using the MultiSpeak Specification

Wireless Communications for SCADA Systems Utilizing Mobile Nodes

Zarządzanie sieciami telekomunikacyjnymi

OPERATIONS CAPITAL. The Operations Capital program for the test years is divided into two categories:

SNMP -overview. Based on: W.Stallings Data and Computer Communications

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity)

SCADA Protocols and Security

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT

Network Security Infrastructure Testing

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

ABB North America. Substation Automation Systems Innovative solutions for reliable and optimized power delivery

Service Identifier Comparison module Service Rule Comparison module Favourite Application Server Reinvocation Management module

WDM network management

An Intelligent Alternative Approach to the efficient Network Management

Introduction to Network Management

European Wind Energy Conference & Exhibition May 2007, Milan.

Remote Management. Vyatta System. REFERENCE GUIDE SSH Telnet Web GUI Access SNMP VYATTA, INC.

Telecommunications Management

Network Management - SNMP

Architecture of distributed network processors: specifics of application in information security systems

Performance Management for Next- Generation Networks

RIG Acceptance Test (RAT) Procedures

PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS

Presentation of Technical Specification to TSG SA

Management Services for Performance Verification in Broadband Multi-Service Networks

TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:

DigiPoints Volume 2. Student Workbook. Module 10 Network Management

A DNP3 Protocol Primer

THE FUTURE OF SMART GRID COMMUNICATIONS

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Introduction to Networks

IEEE Standards Activities in the Smart Grid Space (ICT Focus)

Communications and Computer Networks

data integration/exchange part 2: future technical and business opportunities

NETASQ MIGRATING FROM V8 TO V9

Chapter 2 PSTN and VoIP Services Context

A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems

Securing VoIP Networks using graded Protection Levels

Off-the-shelf Packaged Software Systems And Custom Software Analysis By Gamal Balady MASS Group, Inc.

Recommended IP Telephony Architecture

A Telephone Domain Name System (T-DNS) for Internet Telephony Service at All IP Network

HP OEMF: Alarm Management in Telecommunications Networks

Secure Machine to Machine Communication on the example of Smart Grids

Network Management Architectures for Broadband Satellite Multimedia Systems

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

Customer information on the replacement of LUA/CDIF access technology. Last revised: Mar. 17, 2015

Overview of Routing between Virtual LANs

Comparison of SNMP. Versions 1, 2 and 3

How To Interwork On An Ip Network

Comparison of Routable Control System Security Approaches

SNMP. Simple Network Management Protocol

Substation Automation Using IEC61850 Standard

Heterogeneous Tools for Heterogeneous Network Management with WBEM

A QOS DISTRIBUTION MONITORING SCHEME FOR PERFORMANCE MANAGEMENT OF MULTIMEDIA NETWORKS

SGTech Europe 2015 September 22 th Amsterdam. Pedro Gama, Head of SCADA & Telecom Department at EDP Distribuição, SA

SNMP Network Management Concepts

SITEL Voice Architecture

MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS

Overview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2)

Transcription:

1 Power Systems Monitoring and Control using Telecom Network Standards S. Díaz, J. Luque, M.C. Romero and J. I. Escudero Abstract-- Historically, different solutions have been developed for power systems control and telecommunications network management environments. The former was characterized by proprietary solutions, while the latter has been involved for years in a strong standardization process guided by criteria of openness. Today, power systems control standardization is in progress, but it is at an early stage compared to the telecommunications management area, especially in terms of information modeling. Today, control equipment tends to exhibit more computational power, and communication lines have increased their performance. These trends hint at some conceptual convergence between power systems and telecommunications networks from a management perspective. This convergence leads us to suggest the application of well-established telecommunications management standards for power systems control. This paper shows that this is a real medium-to-long term possibility. Index Terms Power system monitoring, Power system control, Data communication, Computer network management, ITU, ISO, Internet. I. INTRODUCTION Our main objective in this paper is to suggest a brand new approach for carrying out power control, consisting in the adoption of well-established telecommunications network management standards. Although originally developed for this specific environment, we find they are also suitable for the power systems area, taking into account current trends in this field. Telecommunications management standards provide an open approach for the management of diverse equipment, by defining a common set of rules to follow for modeling, structuring and accessing management information. In Section II and III we discuss the singularities of both telecommunications and power systems environments, while Section IV focuses on the reasons that gave rise to this proposal. Section V shows the similarities between both environments and proposes a mapping from the current telecontrol approach onto a standard telecommunications management architecture. Comments on gradual migration S. Díaz is with the Departamento de Tecnología Electrónica, Universidad de Sevilla, Sevilla, 41012 SPAIN (e-mail: sdiaz@dte.us.es). J. Luque is with the Departamento de Tecnología Electrónica, Universidad de Sevilla, Sevilla, 41012 SPAIN (e-mail: jluque@us.es). M. C. Romero is with the Departamento de Tecnología Electrónica, Universidad de Sevilla, Sevilla, 41012 SPAIN (email: mcromero@dte.us.es). J. I. Escudero is with the Departamento de Tecnología Electrónica, Universidad de Sevilla, Sevilla, 41012 SPAIN (e-mail: ignacio@us.es). from legacy SCADA/EMS to telecommunications management architectures are provided in Section VI. Conclusions by the authors are collected in Section VII. II. TELECOMMUNICATIONS NETWORK MANAGEMENT OVERVIEW In the telecommunications area, the equipment to be managed is very diverse, with many different technologies and suppliers in the market. Communication lines in telecommunications networks are usually fast, typically in the Mbps range. These characteristics lead to open solutions for network management, which allow interconnectivity and interoperability between those different elements no matter if the protocols used for this purpose are not especially lightweight. Within this framework, we find two widely applied standards: (Simple Network Protocol) [1] and TMN (Telecommunications Network) [2]. These solutions are basically characterized by defining the following: physical and functional architectures, a management information model, and a protocol for information interchange. We address the fundamentals of both management technologies in the following paragraphs. A. Simple Network Protocol is an Internet standard frequently used in computer network management applications, and, though at first it was considered a simple, short-term solution in telecom management, the reality is that its acceptance in the industry is still increasing. functional architecture distinguishes between two software components: the agent and the manager. An agent is related to a managed resource (which can be physical or logical) and contains the managed objects which represent its properties. These objects can be read or written by the manager at any time. Reading a managed object can result in some kind of access to the managed resource, as writing to a managed object can result in the modification of some characteristic or in the firing of some action on the managed resource. This architecture also contains the notion of proxy agent. A proxy agent is needed when some kind of translation between a environment and a non- environment should be done. Agents and managers could be deployed on physical components in different ways, leading to distinct physical

2 architectures. An agent is a process which runs inside the managed device (or in a module attached to it) and hosts the managed resource(s). Proxy agents run outside the device, in a separate box, but physically connected to it. The manager is also a process but it is run in the management station. Managed resources and management station are connected to a network which enables the communication among them. In large environments, it may be necessary to split the management system in logical subdomains, leading to a hierarchical architecture known as manager of managers. There is a top-level manager which manages the entire network, and several mid-level managers which are responsible for each subdomain. These mid-managers exhibit manager behavior from the managed devices perspective, and agent behavior from the top-level manager perspective. See Fig. 1. Virtually, this structure can exhibit any number of levels. Top-level manager Manager subdomain 1 Managed device Mid-level manager Agent Agent Manager TCP/IP network TCP/IP network Proxy Agent subdomain N Device functionality subject to management Information Base Mid-level manager Managed device Managed device Fig.1. physical and logical architecture. Managed objects and their structure conform the management information model. These are described using a relatively small subset of ASN.1 type constructors, as specified in the standard SMI (Structure of Information) document [3]. The models are organized in modules known as s ( Information Base), provided as text files. There are a large number of generic and specific s defined for management. Managed objects are restricted to atomic and tabular types and are placed into a tree-shaped structure, which represents containment. There is no notion of object class and thus there is no inheritance possible. The model is not object-oriented despite the term managed object. information, in form of managed objects, can be interchanged by protocol messages. These messages are issued under service requests made by the agent or the manager processes. managers use services to get and set managed object values in agents, and agents use services to send confirmed or unconfirmed asynchronous notifications to managers. More information about can be found in the References Section. B. Telecommunications Network TMN presents a more elaborated, object-oriented framework, developed by ITU-T (International Telecommunications Union Telecommunications standardization sector) over existing ISO OSI (International Organization for Standardization Open Systems Interconnection) management standards. TMN is a recommendation focused on the management of large telecommunications networks. The term TMN refers itself to a data network, conceptually (but may not physically) separated from the telecommunications network, where management information flows. In TMN, the functional architecture is built upon different types of functional blocks: Network Element Functions (NEFs) represent the functionality of network devices from a management perspective; Operations Systems Functions (s) process management data in order to monitor, coordinate and/or control both telecommunications and management functions; Workstations Functions (WSFs) provide a means for the human user to access management information; Q Adaptor Functions (s) allow the integration of non-tmn entities in the TMN environment; and Mediation Functions (s) translate data between s and NEFs/s when their respective information models differ in their abstraction level. This translation may imply the storage, adaptation, filtering, thresholding and/or condensation of the information. To represent the communication between two functional blocks, TMN introduces the concept of reference point. In a reference point, the blocks involved communicate using the manager-agent paradigm, as in. In TMN, all the management environment is functionally split into four layers depending on its scope: element management, network management, service management and business management. Then, each functional block can be placed in one of these layers. The functional blocks are placed in physical boxes or

3 building blocks in TMN terminology. The building blocks taxonomy resembles the functional blocks one: there are Network Elements (NEs), Operations Systems (OSs), Workstations (WSs), Q Adaptors (QAs) and Mediation Devices (MDs). Each one of these blocks can perform one or more TMN functions, e.g. an OS building block contains an functional block, but it also may contain, or WSF functional blocks. Building blocks can communicate via a Data Communications Network (DCN), which they are connected to by means of physical interfaces. A TMN interface is, therefore, the physical realization of a reference point that is between functional blocks placed on different building blocks. Fig. 2 summarizes these points. Note the similarity between this architecture and that of despite differences in terminology. TMN MD NE NEF Workstation (WS) WSF Platform (OS) CORBA Data Communications Network Element Sytstem(OS) Data Communications Network Network Element (NE) NEF Non-TMN Network Element (NE) NEF-like Device functionality subject to management Mediation Device Mediation Function Information Base Network Element Network Element Function Server (OS) CORBA Element System (OS) subdomain N subdomain 1 Proxy (MD) Non-TMN Network Element (NE) NEF-like To another TMN QA Q Adapter Q Adapter Function OS Operations System Operations System Function WS Workstation WSF Workstation Function Fig. 2. TMN physical and logical architecture. TMN information architecture is fully imported from OSI management. A management information model is specified in terms of object classes built upon packages which can contain attribute, action and notification definitions. This is a true object-oriented model with support for (multiple) inheritance and containment (i.e., aggregation). In particular, containment relationship leads to a tree-shaped arrangement of the object instances, known as the containment tree, which is also used for instance naming. A management information model in OSI (and hence TMN) is specified by using the Guidelines for the Definition of Managed Objects (GDMO) [4], which introduces a concrete syntax for that purpose. GDMO provide text-based templates to define each element of the model (class, package, behavior, attribute, attribute group, action, notification, relationship, etc.), relying on ASN.1 only for specifying the basic data types. A management information model is provided, therefore, as a set of GDMO and ASN.1 text files. OSI management standards define a set of classes (using GDMO) which are the basis of the TMN generic network information model. This model is then specialized for specific network types. (Common Information Protocol) is the main protocol in TMN/OSI management standards, though it is not the only choice. messages are issued under CMIS (Common Information Service) service requests, which enable the manipulation of the objects: get/set attribute values, start actions, create/delete object instances and report events. CMIS uses a selection mechanism known as scoping and filtering in order to define the set of objects which the protocol operation will be applied to. In essence, scoping uses the containment tree as basis to select the subtree of instances where the filter will be applied to. Only those instances which were selected by scoping and passed the filter test will be used as destination for the protocol operation. TMN and OSI management standards define a rich set of management functions. These functions can be seen as extensions to the services provided by CMIS, facilitating the performance of management tasks such as: event reporting, log control, state management, etc. TMN is more powerful than, but also more complex and expensive. Nevertheless, TMN can interact with by means of a gateway. Merging adequately both approaches, a cost-effective and financially less risky solution can be reached. It also enables a way to a gradual migration from to TMN, if needed. TMN can also interact with CORBA (Common Object Request Broker Architecture), an solution mainly adopted in service management area. More information about TMN and OSI management can be found in the References Section. III. POWER SYSTEMS CONTROL OVERWIEW Telecontrol is basically structured in SCADA (Supervisory Control And Data Acquisition) and RTUs (Remote Terminal Units). The SCADA system is placed on the CC (Control Center), monitoring and controlling the RTUs. Each RTU belongs to a substation, managing its power devices. Usually, a group of study applications run over the information managed by the SCADA, in order to estimate the network state and its parameters, determine the optimal power flow, etc. These application are usually referred as EMSs (Energy

4 Systems). Traditionally, power systems equipment was not very diverse, so openness was not so important. RTUs were simple and lacked intelligence. Moreover, power systems have been using slow communication lines for telecontrol, such as legacy power line communications and radio-relays. Delays are critical in alarm notification, so protocols were designed lightweight and efficient to deal with low transmission rates, but they also became unlayered and, very frequently, proprietary. Currently there is a deployment of new communication facilities in progress throughout the power systems, such as OPGW (Optic Fiber Composite Overhead Ground Wire) and fast power line communications. Therefore, data bandwidth has increased over traditional telecontrol communication lines, supporting the distribution of intelligence. Current substation automation systems and IEDs (Intelligent Electronic Devices), can support a broader functionality than legacy RTUs. Diversity among telecontrol systems has increased as well as market choices. Therefore, openness now becomes a necessity against proprietary implementations. Efforts are being made, mainly by some IEC (International Electrotechnical Commission) workgroups, to standardize telecontrol systems. Fig. 3 shows the telecontrol architecture proposed by IEC. According to IEC, control centers are composed by a set of servers running energy and distribution management applications (EMS and DMS) over SCADA services. The SCADA monitors and control the substations belonging to the control center domain. The telecontrol of the substation devices (switchgears, transformers, etc.) is carried out through its associated remote terminal unit or substation automation system. IEC standards span the whole telecontrol architecture. Specifically, we want to highlight the following: IEC 60870-5 specifies a set of protocols aimed to the exchange of telecontrol information between RTU-CC, and inter-rtu. They follow the approach of traditional telecontrol protocols, but with the benefit that they are standardized. IEC 60870-6 or TASE.2 (Telecontrol Application Service Element 2) defines a set of server objects and a protocol to support the inter-cc communications, though the specification does not preclude the possibility of its use for RTU-CC communications [5]. IEC 61850 deals with substation communications and systems. Specifically, 61850-7, proposes an objectoriented information model for the representation of substation devices [6] [7] [8]. IEC 61968 and 61970 define standard interfaces for DMS and EMS systems, enabling an easier integration of these applications in the system. IV. MOTIVATION The increment in the capacity of the communication lines means that electric utilities can use their data networks not only for telecontrol, but also for their own telecommunications needs. Furthermore, even with these distributed applications running, there is an excess of bandwidth which can be marketed. Thus, electric utilities, in a medium-to-long term, can enter the telecommunications market, offering data and voice services, e.g,, Internet access to residential users [9]. In this context, it will be necessary to deploy a telecommunications management system throughout the network. Power systems control standards are not flexible enough to be adapted to telecommunications management, so the obvious solution would be the use of separate architectures for power control and telecommunications management. Nevertheless, we find that a unified solution is possible, based on already existing telecommunications management standards, such as or TMN. This is the issue we address, from a technical point of view, in the next chapters. Control Center A 60870-5-102 Substation 1 EMS Applications SCADA 61970 61970 Remote Terminal Unit DMS Applications Communication Bus 60870-5-101 60870-5-104 60870-6 61850 60870-5-103 / 61850 Protection, Control, Metering 61850 Switchgears, Transformers, Instrumental Transformers IT-System 61968 61968 61970 Inter-Control Center Datalink Substation Automation System 60870-6 Fig. 3. IEC telecontrol architecture. Provided that electric utilities face, or will do in the near future, telecommunications management requirements, the adoption of TMN and/or for both power system control and telecommunications network management environments imply the adoption of the same software tools and platforms for them. This will reduce the costs related to the purchase, implantation, operator training and maintenance of the telecontrol and management software systems. Control Center B Substation N

5 Moreover, experience on TMN and span several years, with great success; many tools, platforms and management applications are available in the market today at affordable prices due to the competition of a large number of vendors. Some power systems IEC key standards, such as the 61850 set, are still under development or in an early stage of production compared to TMN/. V. MAPPING TELECONTROL SYSTEMS ONTO A TELECOMMUNICATIONS MANAGEMENT ARCHITECTURE We propose the application of TMN/ management architectures to RTU-CC, intra-cc and inter-cc scopes. Communication of management information inside a substation can be done by legacy protocols, DNP3 or IEC 60870/61850 standard protocols; the integration with the rest of the telecontrol system is responsibility of the RTU or substation automation system. To show how TMN/ can be applied to power systems telecontrol, we address the following key issues: A. The mapping of IEC telecontrol architecture onto TMN/ physical and functional architectures; B. The description of power devices using GDMO or SMI syntax, including a simple example; C. The mapping of usual telecontrol services to / protocol operations. D. Security against external network attacks. A. Architectural mapping The architectural mapping can be deduced by comparing the architectures shown on Figs. 1-2 and Fig. 3. In a control center, the SCADA system can be implemented as a network management platform, having a view of every power network device in the management domain, and providing basic management services to the EMS/DMS applications. These are manager processes carrying out network and service management functions. This management platform could be deployed following a hierarchical structure in order to optimize polling. At substation level, proxy agent processes run in the RTUs or substation automation systems, performing Q-adaptor functions and mediation functions. Devices such as switchgears, transformers, protections, etc. are out of the scope of the management network, being under the jurisdiction of the RTU or substation automation system. Fig. 4 summarizes these points showing both physical and functional blocks, using, as reference, TMN notation. Normally, this management architecture will be integrated with the existing telecontrol architecture. Integration and migration issues are covered in Section VI. The architecture depicted in Fig. 4 would eventually evolve to a model whose network elements would become TMN/-compliant so the RTUs could simply be replaced by network routers. This is the approach that telecommunications management takes. B. Telecontrol information mapping Managed devices are represented by managed objects which reside in the -caches associated to the TMN/-compliant RTUs or substation automation systems. These objects are instances of the managed classes which are specified in modules, using a standard notation such as GDMO or SMI syntax. These classes can be based on IEC 61850-7 standards. The management platform, performing SCADA functions, uses the modules to learn the capabilities of the objects to manage. As a example, a circuit breaker can be described using GDMO and ASN.1 syntax, see Fig. 5. This example is based on IEC 61850-7-4 XCBR class [7] [8]. circuitbreaker class is defined with a MANAGED OBJECT CLASS template as a specialization of logicalnode class. Then, circuitbreaker is characterized by the following packages: basiclogicalnodeinfopackage (inherited from logicalnode), controllabledatapackage and statusinformationpackage (which are specialized circuitbreaker packages). Each package must be further defined in a PACKAGE template, in terms of attributes, notifications and actions. In this example, for the sake of simplicity, some parts of the complete definition are omitted. Notifications and actions (defined using NOTIFICATION and ACTION templates) are commented in Subsection C, regarding protocol operations. Substation 1 MD NE NEF Control Center A Workstation (WS) WSF SCADA (OS) CORBA Data Communications Network RTU/SAS (MD) Non-TMN Network Element (NE) NEF-like Device functionality subject to management Mediation Device Mediation Function Information Base Network Element Network Element Function Substation N EMS Apps (OS) CORBA RTU/SAS (MD) TMN/ To another Control Center QA Q Adapter Q Adapter Function OS Operations System Operations System Function RTU Remote Terminal Unit SAS Substation Automation System WS Workstation WSF Workstation Function Fig. 4. Physical architecture of a TMN/-compliant power system management environment.

6 logicalnode MANAGED OBJECT CLASS DERIVED FROM top; CHARACTERIZED BY basiclogicalnodeinfopackage; {telecontrol-classes 1}; basiclogicalnodeinfopackage PACKAGE BEHAVIOUR basiclogicalnodeinfobehaviour; ATTRIBUTES mode GET-REPLACE, lnerror GET, localoperation GET, devicenameplate GET-REPLACE, operationcounter GET, health GET; {telecontrol-packages 1}; mode ATTRIBUTE WITH ATTRIBUTE SYNTAX basicinfo-asn1.controllableintegerstatus MATCHES FOR EQUALITY; BEHAVIOUR modebehaviour; {telecontrol-attributes 3}; circuitbreaker MANAGED OBJECT CLASS DERIVED FROM logicalnode; CHARACTERIZED BY controllabledatapackage, statusinformationpackage; {telecontrol-classes 24}; controllabledatapackage PACKAGE BEHAVIOUR controllabledatapackagebehaviour; ATTRIBUTES switchposition GET-REPLACE, blockopening GET-REPLACE, blockclosing GET-REPLACE, chargermotorenabled GET-REPLACE; ACTIONS select, cancel, operate, timeactivatedoperate; NOTIFICATIONS statechange, qualitychange; {telecontrol-packages 10}; controllabledata-asn1 DEFINITIONS ::= BEGIN IMPORTS EXPORTS ControllableDoublePoint, ControlValue ::= BOOLEAN StateValue ::= ENUMERATED { intermediate-state (0), off (1), on (2), bad-state (3) } Quality ::= SEQUENCE { validity ENUMERATED { good, questionable, invalid} DEFAULT good, detail-quality BIT-STRING { overflow (0), outofrange (1), badreference (2), oscillatory (3), failure (4), olddata (5), inconsistent (6) }, source ENUMERATED { process, defaulted, substituted} DEFAULT process, test BOOLEAN, operatorblocked BOOLEAN } ControllableDoublePoint ::= SEQUENCE { ctlval ControlValue, stval StateValue, q Quality, } END switchposition ATTRIBUTE WITH ATTRIBUTE SYNTAX controllabledata-asn1.controllabledoublepoint MATCHES FOR EQUALITY; BEHAVIOUR switchpositionbehaviour; {telecontrol-attributes 31}; Fig. 5. Partial example of management information definition using GDMO: circuitbreaker class. ATTRIBUTE templates specify the data type of the attribute along with their allowable matching tests. Attribute data types are defined using ASN.1 basic and structured constructs in separate ASN.1 modules, such as controllabledata-asn1 in the example. Attributes can be grouped to create data sets. Every GDMO element definition should be registered to assure its uniqueness. In the example, we arbitrarily assigned unique values to the classes, packages and attributes using the statechange NOTIFICATION BEHAVIOUR statechangebehaviour; WITH INFORMATION SYNTAX reportformat-asn1.reportformat; {telecontrol-notifications 5}; operate ACTION BEHAVIOUR operatebehaviour; MODE CONFIRMED; WITH INFORMATION SYNTAX controlservice-asn1.operaterequest; WITH REPLY SYNTAX controlservice-asn1.operateresponse; {telecontrol-actions 8}; clause. In a real-world case, registration should be conducted by a recognized authority. GDMO definitions are machine-readable and can be compiled to automatically obtain instrumentable code for agent development. Package, attribute, notification, etc. behaviour should be implemented manually because BEHAVIOUR templates (referenced but omitted in the example) are specified in natural language.

7 C. Protocol operations and services mapping Data attributes can be read or modified, provided that their access requirements are met, using get and set or operations. Event reporting in TMN can be carried out by means of event-report operation and ITU-T X.734 management function, which introduces an event forwarding discriminator class that filters notifications emerging from managed objects, and redirects them to the specified destinations. The notifications that an object can issue are defined, along with their parameters, in NOTIFICATION templates referenced from the packages included in the GDMO class definition of that object, as it is done in the example with statechange notification. Event format should be defined in an ASN1 module. Event logging, ITU-T X.735, is similar to event reporting except that the destination is a log file. Both TMN event reporting and logging mechanism are very similar to that of IEC 61850-7-2 [6]. In, event reporting mechanism is based on trap and inform protocol messages. Filtering and logging design is up to the developer. Telecontrol specific services such as value substitution or select-before-operate control [6] can be implemented in TMN as action operations and specified in GDMO using ACTION templates. Actions are referenced in the packages imported by the classes which actually perform them. In the example, the operate action is defined as a confirmed service; its request and response format should be specified using ASN.1 types. In, such services can be mapped onto set operations, performed over a group of variables representing the action arguments, and a special variable whose behavior consists in firing the action when it is written. Again, specific design is up to the developer. Finally, has support for the dynamic creation or deletion of object instances. In case, this behavior should be implemented by means of set operations. D. Security issues The security of the telecontrol systems against external attacks is an important issue if the utility telecommunications network routes user data traffic (e.g. by offering Internet services) along with telecontrol information. Security mechanisms must be deployed to assure reliability of the power system. Fortunately, and can be used in secure distributed applications by using cryptographic keys for authentication and encryption. In particular: protocol can work over Internet IPsec (IP security protocol) or ISO NLSP (Network Layer Secure Protocol); v3 embeds a cryptographic security mechanism, though it is also possible to employ the more widely available v2 over IPsec. Telecommunications network management and power system telecontrol, even built upon the same kind of systems, are separate distributed applications and this can be taken into account when designing the data network and configuring access control rules into the routers, in order to reduce potential security risks. VI. MIGRATION AND COEXISTENCE BETWEEN LEGACY AND TMN/-BASED TELECONTROL SYSTEMS For TMN/ management to be successful as option for power systems telecontrol, it must be easy to: migrate from legacy telecontrol subsystems to TMN/-compliant subsystems; and integrate new TMN/-compliant subsystems with existent telecontrol subsystems. These requisites enable a cost-effective planning of telecontrol systems as an integrated mixture of upgradeable technologies. At control center level, existing telecontrol systems and TMN/ systems can be integrated by means of gateways, responsible of the translation between protocols and information models. For example, a /-IEC 61850 gateway could be developed to reach interoperability between those systems, especially if the TMN/ s are based on the 61850 standard classes definition. Moreover, existing IEC 61970-based EMS applications could interact with the TMN/ platform via a CORBA gateway. At substation level, legacy RTUs can be integrated into a TMN/ environment by developing a custom proxy agent. This agent will be similar to the one embedded in a TMN/-compliant RTU, because it will implement the same functions, but it will be deployed in a separate hardware module. Another option would be the simultaneous integration of several legacy RTUs by a proxy agent module located in the control center. Both approaches are shown in Fig. 6. Tools for agent development already exists in the market. These tools aid in the definition of the module, its compilation and the generation of a code skeleton which can be completed to implement managed object behaviors and protocols for the communications with the legacy RTU. VII. CONCLUSIONS Telecommunications management architectures utilize standard protocol and information models, thus assuring interoperability among the physical and logical management entities. These protocols and models, designed for the management of telecommunication networks and services, are flexible enough to be adapted to energy management following the guidelines described in Section V. Today utilities are experiencing an increment in their data bandwidth due to recent developments such as fast power line communications and the installation of optic fiber in high voltage power networks. Consequently, energy utilities are now interested in providing telecommunication services such as data transport, Internet access or voice over IP (Internet Protocol). These utilities can use the same solution for telecommunications management and energy management, which may help in reducing purchase, implantation, training and maintenance costs, by using well-known

8 telecommunications management platforms and tools. Nevertheless, configuration and management of both domains can be done separately though the same kind of systems have been implanted for them, in order to delegate these tasks to different departments and increase security at the same time. TMN/ Control Center Substation MD Proxy (MD) Data Communications Network / Legacy RTU/SAS Mediation Device Mediation Function Information Base Substation 1 RTU SAS Legacy RTU/SAS Proxy (MD) / Substation N Q Adapter Function Remote Terminal Unit Substation Automation System Fig. 6. Integrating legacy RTUs to a TMN/ environment. This paper introduces the fundamentals behind the adaptation of TMN/ standards for power system telecontrol, leaving open several topics for further discussion. These topics include the development of a complete GDMO/ SMI specification of power devices, maybe using IEC 61850-7 as a guide (like the example in Section V); the implementation of gateways for the integration with traditional telecontrol systems; the evaluation of security mechanism; and the analysis of / efficiency as real-time protocols. Also, communications network design is an essential issue which must be dealt with great care because it has a high impact on both performance and costs. In particular, if a utility decides to offer telecommunications services, the most appropriate solution would be an IP-based network. Therefore, if a management solution is needed for the power system control, it is natural to profit from having an IP network and implanting a CMOT ( over TCP/IP) and/or -based management environment. Nevertheless, some critical requirements must be met in order to use of IP for telecontrol tasks [10]. VIII. REFERENCES [1] Introduction to Version 3 of the Internet-standard Network Platform, RFC 2570, Apr. 1999 [Online] Available: http://www.rfceditor.org/rfc/rfc2570.txt [2] Principles for a Telecommunications Network, ITU-T Recommendation M.3010, 2000 [3] Structure of Information Version 2 (SMIv2), RFC 2578, Apr. 1999 [Online] http://www.rfc-editor.org/rfc/rfc2578.txt Legacy RTU/SAS [4] Information Technology Open Systems Interconnection Structure of Information Guidelines for the Definition of Managed Objects, ITU-T Rec. X.722, 1992 [5] Telecontrol Equipment and Systems Part 6-505: Telecontrol Protocols Compatible with ISO Standards and ITU-T Recommendations TASE.2 User Guide, IEC 60870-6-505, 2002 [6] Communications Networks and Systems in Substations Part 7-2: Basic Communication Structure for Substations and Feeder Equipment Abstract Communication Service Interface (ACSI), IEC (draft) 61850-7- 2, 2002 [7] Communications Networks and Systems in Substations Part 7-3: Basic Communication Structure for Substations and Feeder Equipment Common Data Classes, IEC (draft) 61850-7-3, 2002 [8] Communications Networks and Systems in Substations Part 7-4: Basic Communication Structure for Substations and Feeder Equipment Compatible Logical Node Classes and Data Classes, IEC (draft) 61850-7-4, 2002 [9] S. Díaz, El uso de arquitecturas de gestión de comunicaciones en el telecontrol de redes eléctricas, Dpto. de Tecnología Electrónica, University of Seville, Spain. Rep. TESP-0202-022, Mar. 2002. [10] C. Samitier, J. Darné. The Use of the IP Technology to Deploy a Modern Telecontrol Network. Presented at Distributech 2001. [Online]. Available: http://www.gne-eng.com/files/ip_tc_2001_paper.pdf IX. BIOGRAPHIES S. Díaz received his degree in Computer Engineering in 1999 from the University of Seville (Spain). At present he is working in his Ph. D. thesis in Power System Control. Since 1999 he has worked in several research projects focused on telecommunications network management, protocol engineering and power systems telecontrol at the University of Seville. In 2000 he became Associate Professor and began his teaching work in the School of Computer Engineering, University of Seville. J. Luque received his degree in Industrial Engineering in 1980 and his Doctorate in Industrial Engineering in 1986 from the University of Seville (Spain). Since 1980 he has worked for several companies in the area of SCADA systems for electrical networks, participating in some of the primary EMS projects in Spain. He is currently Professor of electronic engineering at the University in Seville, and is a member of the IEEE. M. C. Romero received her degree in Computer Engineering in 1999 from the University of Seville (Spain). At present she is working in her Ph. D. thesis in Multimedia Control of Power Systems. Since 1999 she has worked in several research projects focused on telecommunications network management and power systems telecontrol at the University of Seville. In 2001 she became Associate Professor and began her teaching work in the School of Computer Engineering, University of Seville. J.I. Escudero received his Physics degree in 1979 and his Doctorate in Physics in 1995 from the University of Seville (Spain). He has held several teaching positions. He has been Professor of electronic engineering at the University of Seville since 1989. Dr. Escudero has focused his research activity on the study of telecommunications network performance.